General

  • Target

    aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da

  • Size

    217KB

  • Sample

    221030-pg85hsadc8

  • MD5

    a28ebe523e552baf86efc4c29cbe3b66

  • SHA1

    f32fe77693914c4afb90193d37496a8b43d7dc23

  • SHA256

    aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da

  • SHA512

    d044e586674da4c8f49477023961e73c30d9df2ebf270e34136077bcb02d1fd79526d386ad4cd0f9937a1eba38d066a254c99964f67a41c7aa7cbf5574fc8bca

  • SSDEEP

    6144:bKg3WR3nKrBxUvhVyUH4aAt9rOLLpuPPmE:bKNR3KrBA+6At9regXmE

Score
8/10

Malware Config

Targets

    • Target

      aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da

    • Size

      217KB

    • MD5

      a28ebe523e552baf86efc4c29cbe3b66

    • SHA1

      f32fe77693914c4afb90193d37496a8b43d7dc23

    • SHA256

      aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da

    • SHA512

      d044e586674da4c8f49477023961e73c30d9df2ebf270e34136077bcb02d1fd79526d386ad4cd0f9937a1eba38d066a254c99964f67a41c7aa7cbf5574fc8bca

    • SSDEEP

      6144:bKg3WR3nKrBxUvhVyUH4aAt9rOLLpuPPmE:bKNR3KrBA+6At9regXmE

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks